GLSA-202405-16 : Apache Commons BCEL: Remote Code Execution

critical Nessus Plugin ID 194996

Description

The remote host is affected by the vulnerability described in GLSA-202405-16 (Apache Commons BCEL: Remote Code Execution)

- The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan. (CVE-2022-34169)

- Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache Commons BCEL 6.6.0. (CVE-2022-42920)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

All Apache Commons BCEL users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose >=dev-java/bcel-6.6.0

See Also

https://security.gentoo.org/glsa/202405-16

https://bugs.gentoo.org/show_bug.cgi?id=880447

Plugin Details

Severity: Critical

ID: 194996

File Name: gentoo_GLSA-202405-16.nasl

Version: 1.0

Type: local

Published: 5/6/2024

Updated: 5/6/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-42920

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:bcel, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/5/2024

Vulnerability Publication Date: 7/19/2022

Reference Information

CVE: CVE-2022-34169, CVE-2022-42920